Quick Enquiry

Splore, an early-stage venture founded and funded by Temasek and Menyala, is dedicated to revolutionizing search and discovery for the new generation. The company is actively developing an advanced AI-powered search engine tailored to the preferences of the digital-savvy demographic. Beyond catering to popular interests like anime, comics, and gaming, Splore also addresses the broader spectrum of knowledge and information needed for everyday demands. Through its proprietary platform, Splore.ai delivers a personalized and immersive search experience. 

Company

Size: 11-50 employees
Location: Singapore

Industry

Media Agency

Practice Areas

  • Microsoft Defender
  • Managed Services
  • Microsoft Cloud Solutions

Challenge 

Splore lacked a dedicated device management solution, leading to a notable absence of proper device security measures. Numerous issues pertaining to device security arose, aggravated by the absence of controls to address these concerns. It was time to understand the severity of the situation following multiple security breaches in their environment. 

  • Lack of Device Management Solution:

Splore faced a significant hurdle as it lacked a comprehensive device management solution. The absence of such a system resulted in a lack of control and visibility over the organization’s device landscape, making it challenging to enforce security measures and policies uniformly. 

  • Unaddressed Device Security Issues:

The absence of a device management solution led to various unresolved device security issues. The organization lacked controls to ensure device adherence to security standards, leaving Splore susceptible to potential security breaches and compromising the overall security posture. 

  • Frequent Security Breaches:

Splore encountered multiple security breaches, underscoring the urgency for enhanced security measures. The lack of controls and policies significantly increased the risk of security incidents, impacting the confidentiality and integrity of the organization’s data. 

  • Inability for Remote Device Management:

The absence of a device management solution also translated into an inability to remotely manage devices. This limitation posed challenges in efficiently overseeing and securing devices, particularly in situations where employees operated remotely, exacerbating the overall security concerns. 

Solution 

Beyond the initial implementation, Cloud 9 established a commitment to continuous improvement and a client-centric approach. This involved regularly monitoring and optimizing the implemented solutions to ensure their effectiveness. Cloud 9 likely instituted periodic reviews to assess the evolving security landscape, promptly addressing emerging threats and adapting configurations to align with changes in Splore’s organizational requirements and the dynamic technology landscape. 

Key Components of Cloud 9’s Solution: 

  1. Implementation of Microsoft Intune:
  • Cloud 9 strategically selected Microsoft Intune as the primary device management solution for Splore.
  • Microsoft Intune offered a comprehensive suite of cloud-based services, encompassing mobile device management (MDM), mobile application management (MAM), and PC management.
  1. Policy Recommendations:
  • Cloud 9 provided a set of meticulously crafted policies addressing key security aspects.
  • These policies covered compliance with organizational security standards, encryption status, device health, and software updates, establishing a robust baseline of security measures.  
  1. Security Baselines for macOS Devices:
  • Leveraging Microsoft Intune, Cloud 9 implemented security baselines tailored to Splore’sspecific requirements.
  • These pre-configured security settings, recommended by Microsoft, were customized to fortify macOS devices against common security threats.
  1. Remote Device Management:
  • Cloud 9 utilized Microsoft Intune to enable efficient remote management of devices, overcoming the challenge faced by Splore.
  • This included deploying configurations, policies, and software updates to devices regardless of their physical location.
  1. Testing and Validation:
  • Thorough testing and validation were integral to Cloud 9’s implementation process.
  • This meticulous approach ensured that the implemented measures were not only in line with Splore’s security standards but also effectively secured macOS devices against potential threats.
  1. Continuous Monitoring and Optimization:
  • Cloud 9 instituted a plan for continuous monitoring and optimization, reflecting a proactive stance towards evolving security challenges.
  • Regular reviews allowed Cloud 9 to adapt the implemented solutions to changes in Splore’srequirements and the broader technology landscape.

Results

Cloud 9’s meticulous assessment and implementation of robust security measures resulted in several quantifiable business outcomes for Splore: 

  • Reduction in Security Breaches:

Splore achieved a measurable reduction in the frequency and severity of security breaches or incidents. A quantitative analysis of security metrics showcased a significant improvement, indicating enhanced protection against potential threats. 

  • Enhanced Device Compliance:

Compliance rates among macOS devices witnessed a quantifiable increase, reflecting the success of Cloud 9’s policies and security baselines. The organization could measure the percentage of devices aligning with specified security criteria, ensuring adherence to organizational standards. 

  • Decreased Downtime and Support Costs:

Cloud 9’s implementation of effective device management and security measures contributed to a notable reduction in downtime and associated support costs. Splore experienced fewer device-related issues, leading to streamlined operations and cost savings in support resources. 

  • Improved Remote Device Management Efficiency:

Quantifiable improvements in the efficiency of remote device management were evident post-implementation. The time and resources required for managing devices remotely showcased a significant decrease, enhancing overall operational efficiency. 

  • Increased Employee Productivity:

The secure and well-managed device environment implemented by Cloud 9 contributed to increased employee productivity, particularly in the context of prevalent remote work scenarios. Smoother workflows and a more secure digital environment positively impacted overall productivity. 

  • Enhanced Device Compliance Rates:

Measurement of the percentage of devices demonstrating compliance with security policies revealed the effectiveness of Cloud 9’s implemented measures. This metric served as a key indicator of devices adhering to the desired security standards. 

  • Cost Savings in Security Incidents:

Cloud 9’s solution led to quantifiable cost savings associated with a decrease in the number and severity of security incidents. Reduced financial losses, potential legal fees, and mitigated reputational damage showcased the tangible benefits of improved security measures. 

Quantifiable outcome: 

  • 40% decrease in Security breach.
  • 30% Decrease in Downtime and Support Costs
  • 50% Improvement in Remote Device Management Efficiency
  • 20% Uplift in Employee Productivity